![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the workshops co-located with the 4th International Joint Conference on Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013. The 33 revised full papers presented were carefully reviewed and selected from numerous submissions to the following workshops: 5th International Workshop on Intelligent Environments Supporting Healthcare and Well-being (WISHWell 13) 3d International workshop on Pervasive and Context-Aware Middleware (PerCAM 13), 2nd International Workshop on Adaptive Robotic Ecologies (ARE'13), International Workshop on Aesthetic Intelligence (AxI'13), First International Workshop on Uncertainty in Ambient Intelligence (UAmI13). The papers are organized in topical sections on intelligent environments supporting healthcare and well-being; adaptive robotic ecologies; uncertainty in ambient intelligence; aesthetic intelligence; pervasive and context-aware middleware."
Now in paperback for the first time, Social Movements and their Technologies explores the interplay between social movements and their 'liberated technologies'. It analyzes the rise of low-power radio stations and radical internet projects ('emancipatory communication practices') as a political subject, focusing on the sociological and cultural processes at play. It provides an overview of the relationship between social movements and technology, and investigates what is behind the communication infrastructure that made possible the main protest events of the past fifteen years. In doing so, Stefania Milan illustrates how contemporary social movements organize in order to create autonomous alternatives to communication systems and networks, and how they contribute to change the way people communicate in daily life, as well as try to change communication policy from the grassroots. She situates these efforts in a historical context in order to show the origins of contemporary communication activism, and its linkages to media reform campaigns and policy advocacy.
This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.
This book constitutes the refereed proceedings of the European Conference on Information Literacy, ECIL 2013, held in Istanbul Turkey, in October 2013. The 73 revised full papers presented together with two keynotes, 9 invited papers and four doctoral papers were carefully reviewed and selected from 236 submissions. The papers are organized in topical sections on overview and research; policies and strategies; theoretical framework; related concepts; citizenship and digital divide; disadvantaged groups; information literacy for the workplace and daily life; information literacy in Europe; different approaches to information literacy; teaching and learning information literacy; information literacy instruction; assessment of information literacy; information literacy and K-12; information literacy and higher education; information literacy skills of LIS students; librarians, libraries and ethics.
"Data Security Breaches and Privacy in Europe" aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
This book constitutes the refereed proceedings of the 5th International Conference on Social Robotics, ICSR 2013, held in Bristol, UK, in October 2013. The 55 revised full papers and 13 abstracts were carefully reviewed and selected from 108 submissions and are presented together with one invited paper. The papers cover topics such as human-robot interaction, child development and care for the elderly, as well as technical issues underlying social robotics: visual attention and processing, motor control and learning.
The proposed book explores the theme of identity, specifically as applied to its role and development in virtual worlds. Following the introduction, it is divided into four sections: identities, avatars and the relationship between them; factors that support the development of identity in virtual worlds; managing multiple identities across different environments and creating an online identity for a physical world purpose.
This book constitutes the proceedings of the 13th International Conference on Transport Systems Telematics, TST 2013, held in Katowice-Ustron, Poland, in October 2013. The 58 papers included in this volume were carefully reviewed and selected for inclusion in this book. They provide an overview of solutions being developed in the field of intelligent transportation systems, and include theoretical and case studies in the countries of conference participants.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.
This book constitutes the proceedings of the 19th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Wellington, New Zealand, in October/November 2013. The 18 revised papers presented together with 4 progress papers were carefully reviewed and selected from 34 submissions. They are organized into six thematic sessions as follows social media, social networks, crowdsourcing, learning, collaboration design and software development.
This two volume set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
This book constitutes the proceedings of the 8th International and Interdisciplinary Conference on Modeling and Using Context, CONTEXT 2013, held in Annecy, France, in October/November 2013. The 23 full papers and 9 short papers presented were carefully reviewed and selected from numerous submissions. In addition the book contains two keynote speeches and 9 poster papers. They cover cutting-edge results from the wide range of disciplines concerned with context, including: Cognitive Sciences (Linguistics, Psychology, Computer Science, Neuroscience), and computer science (artificial intelligence, logics, ubiquitous and pervasive computing, context-awareness systems), and the Social Sciences and Organizational Sciences, as well as the Humanities and all application areas, including Medicine and Law.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the workshops held withthe 17th International Conference on Image Analysis and Processing, ICIAP 2013, held in Naples, Italy, in September 2013. The proceedings include papers from the five individual workshops focusing on topics of interest to the pattern recognition, image analysis, and computer vision communities, exploring emergent research directions or spotlight cross-disciplinary links with related fields and / or application areas."
This book examines the struggles over technology's use in education, digging into what the purpose of education is, how we should achieve it, who the stakeholders are, and whose voices win out. Drawing on theoretical and empirical work, it lays bare the messy realities of technology use in education and their implications for contemporary society.
This book constitutes the refereed proceedings of the 4th International Conference on Serious Games Development and Applications, SGDA 2013, held in Trondheim, Norway, in September 2013. The 32 papers (23 full papers, 9 short papers/posters and 2 invited keynotes) presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on games for health, games for education and training, games for other purposes, game design and theories, gaming interface, policy matters.
This volume, intended for students and business professionals, provides an introduction to Computer Supported Cooperative Work (CSCW). The authors illustrate CSCW in action and discuss general trends in computer support systems including artificial intelligence, extended realities, and new strategies for interacting with technology. The changing job and worker requirements that accompany CSCW are examined from both a behavioral and technical standpoint. In addition, the authors discuss the implications for various aspects of human resource management including personnel selection, training, leadership, and performance appraisal. Written for the non-computer specialist, the book is easy to understand and will be useful to students in business, psychology, and computer courses and to business professionals implementing CSCW technologies.
This book constitutes the refereed proceedings of the 8th
International Conference on Haptic and Audio Interaction Design,
HAID 2013, held in Daejeon, Korea, in April 2013.
A deep dive into the political roots of advertising on the internet The contemporary internet's de facto business model is one of surveillance. Browser cookies follow us around the web, Amazon targets us with eerily prescient ads, Facebook and Google read our messages and analyze our patterns, and apps record our every move. In Profit over Privacy, Matthew Crain gives internet surveillance a much-needed origin story by chronicling the development of its most important historical catalyst: web advertising. The first institutional and political history of internet advertising, Profit over Privacy uses the 1990s as its backdrop to show how the massive data-collection infrastructure that undergirds the internet today is the result of twenty-five years of technical and political economic engineering. Crain considers the social causes and consequences of the internet's rapid embrace of consumer monitoring, detailing how advertisers and marketers adapted to the existential threat of the internet and marshaled venture capital to develop the now-ubiquitous business model called "surveillance advertising." He draws on a range of primary resources from government, industry, and the press and highlights the political roots of internet advertising to underscore the necessity of political solutions to reign in unaccountable commercial surveillance. The dominant business model on the internet, surveillance advertising is the result of political choices-not the inevitable march of technology. Unlike many other countries, the United States has no internet privacy law. A fascinating prehistory of internet advertising giants like Google and Facebook, Profit over Privacy argues that the internet did not have to turn out this way and that it can be remade into something better.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The 25 papers (20 full research papers, 4 demonstration papers, and one abstract of the keynote speech) presented were carefully reviewed and selected from various submissions. The papers cover the following topics related to mobile Web and Information Systems (WISs), such as mobile Web services, location-awareness, design and development, social computing and society, development infrastructures and services, SOA and trust, UI migration and human factors, and Web of Things and networks.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
This book constitutes the refereed proceedings of the Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013. The 19 revised full papers presented were carefully reviewed and selected for inclusion in this volume. They focus on the currently most sensitive areas in the field, such as identity management as a core component in any e-government or participation system, open data, mobile government applications as well as intelligent and learning systems.The papers are organized in the following topical sections: identity management in e-government; intelligent systems in e-government; e-government cases; mobile government; open government data; and e-participation. |
![]() ![]() You may like...
|